咨询与建议

限定检索结果

文献类型

  • 3,886 篇 期刊文献
  • 3,442 篇 会议
  • 88 册 图书

馆藏范围

  • 7,416 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 4,546 篇 工学
    • 2,755 篇 计算机科学与技术...
    • 2,224 篇 软件工程
    • 1,036 篇 信息与通信工程
    • 766 篇 控制科学与工程
    • 713 篇 电气工程
    • 591 篇 电子科学与技术(可...
    • 476 篇 生物工程
    • 421 篇 机械工程
    • 402 篇 光学工程
    • 363 篇 生物医学工程(可授...
    • 343 篇 仪器科学与技术
    • 222 篇 化学工程与技术
    • 219 篇 动力工程及工程热...
    • 181 篇 材料科学与工程(可...
    • 167 篇 航空宇航科学与技...
    • 151 篇 交通运输工程
    • 150 篇 网络空间安全
  • 2,939 篇 理学
    • 1,248 篇 物理学
    • 1,154 篇 数学
    • 572 篇 生物学
    • 406 篇 统计学(可授理学、...
    • 301 篇 系统科学
    • 263 篇 化学
    • 202 篇 地球物理学
  • 1,129 篇 管理学
    • 740 篇 管理科学与工程(可...
    • 428 篇 图书情报与档案管...
    • 320 篇 工商管理
  • 424 篇 医学
    • 362 篇 临床医学
    • 274 篇 基础医学(可授医学...
    • 167 篇 药学(可授医学、理...
  • 153 篇 法学
  • 106 篇 农学
  • 96 篇 经济学
  • 63 篇 教育学
  • 28 篇 文学
  • 18 篇 艺术学
  • 17 篇 军事学
  • 2 篇 哲学
  • 1 篇 历史学

主题

  • 201 篇 deep learning
  • 147 篇 machine learning
  • 140 篇 feature extracti...
  • 120 篇 laboratories
  • 115 篇 computational mo...
  • 114 篇 accuracy
  • 110 篇 artificial intel...
  • 95 篇 training
  • 90 篇 optimization
  • 88 篇 information tech...
  • 87 篇 semantics
  • 74 篇 internet of thin...
  • 66 篇 computer science
  • 66 篇 image segmentati...
  • 66 篇 predictive model...
  • 63 篇 reinforcement le...
  • 62 篇 data mining
  • 58 篇 neural networks
  • 54 篇 wireless communi...
  • 51 篇 visualization

机构

  • 287 篇 faculty of scien...
  • 286 篇 department for p...
  • 285 篇 department of ph...
  • 281 篇 departamento de ...
  • 277 篇 department of ph...
  • 267 篇 department of ph...
  • 266 篇 department of ph...
  • 265 篇 kirchhoff-instit...
  • 259 篇 faculté des scie...
  • 255 篇 institute of phy...
  • 242 篇 fakultät für phy...
  • 232 篇 institut für ast...
  • 230 篇 yerevan physics ...
  • 228 篇 institute of phy...
  • 223 篇 department of ph...
  • 221 篇 department of ph...
  • 217 篇 physics division...
  • 211 篇 department of ph...
  • 206 篇 department of ph...
  • 198 篇 department of ph...

作者

  • 266 篇 c. alexa
  • 266 篇 j. m. izen
  • 266 篇 g. bella
  • 266 篇 j. strandberg
  • 266 篇 d. calvet
  • 266 篇 c. amelung
  • 265 篇 g. spigo
  • 265 篇 a. c. könig
  • 264 篇 f. siegert
  • 262 篇 m. klein
  • 260 篇 r. ströhmer
  • 259 篇 h. a. gordon
  • 256 篇 h. sakamoto
  • 256 篇 m. rijssenbeek
  • 256 篇 s. jin
  • 256 篇 g. gaudio
  • 256 篇 s. mohapatra
  • 255 篇 y. nagasaka
  • 246 篇 s. guindon
  • 243 篇 d. guest

语言

  • 6,246 篇 英文
  • 1,079 篇 其他
  • 90 篇 中文
  • 11 篇 日文
  • 5 篇 德文
  • 4 篇 法文
  • 2 篇 斯洛文尼亚文
  • 1 篇 俄文
检索条件"机构=Faculty of Information Technology and Systems Computer Engineering Laboratory"
7416 条 记 录,以下是791-800 订阅
排序:
An optimized facial recognition model for identifying criminal activities using deep learning strategy
收藏 引用
International Journal of information technology (Singapore) 2023年 第7期15卷 3907-3921页
作者: Gokulakrishnan, S. Chakrabarti, Prasun Hung, Bui Thanh Shankar, S. Siva Artificial Intelligence Laboratory Faculty of Information Technology Ton Duc Thang University Ho Chi Minh City Viet Nam Deputy Provost ITM SLS Baroda University Gujarat Vadodara India Department of Computer Science and Engineering KG Reddy College of Engineering and Technology (Autonomous) Telangana Hyderabad India
The most important research field in the current period is facial recognition and detection. Furthermore, facial expression recognition applications are essential in various research areas such as criminal investigati... 详细信息
来源: 评论
The Empirical Evaluation of Artificial Intelligence-based Techniques for Improving Cyber Security  2
The Empirical Evaluation of Artificial Intelligence-based Te...
收藏 引用
2nd International Conference on Electronics and Renewable systems, ICEARS 2023
作者: Nayak, Chhaya Rao, Chintala Lakshmana Alam, Tanweer Singh, Shalini Islam, Shaziya Maginmani, Umme Habiba Pimpri Chinchwad College of Engineering Pune India School of Law Visakhapatnam India Islamic University of Madinah Faculty of Computer and Information Systems Department of Computer Science Madinah Saudi Arabia Graphic Era Deemed to Be University Department of Ece Uttarakhand Dehradun248002 India Rungta College of Engineering and Technology Bhilai India Secab Institute of Engineering and Technology Department of Computer Science and Engineering Karnataka Vijayapur India
Artificial intelligence (AI) technologies have been recently developed, and their advantages can be observed in a wide range of domains, from image processing to face detection. AI-based approaches can assist opponent... 详细信息
来源: 评论
OMNI- CHANNEL RETAILING FOR ENHANCING CUSTOMER ENGAGEMENT AMIDST SUPPLY CHAIN DISRUPTION: AN EMERGING MARKET PERSPECTIVE
Decision Making: Applications in Management and Engineering
收藏 引用
Decision Making: Applications in Management and engineering 2023年 第1期6卷 449-473页
作者: Joshi, Sudhanshu Sharma, Manu Chatterjee, Prasanjit Operations and Supply Chain Management Research Laboratory School of Management Doon University Dehradun India School of Computer Science Faculty of Engineering & Information Technology University of Technology Sydney Sydney Australia Department of Management Studies Graphic Era Deemed to be University Dehradun India Guidhall School of Business and Law London Metropolitan University London United Kingdom MCKV Institute of Engineering West Bangal India
The research aims to explore the strength of enablers and adoption barriers in omnichannel retailing (OCR) and discuss how organizations may focus on redesigning their business models in emerging markets to manage the... 详细信息
来源: 评论
Research on intrusion detection algorithm based on dilated convolution and bidirectional gating cyclic unit
Research on intrusion detection algorithm based on dilated c...
收藏 引用
2022 International Conference on Algorithms, Microchips and Network Applications
作者: Liu, Xingyuan Miao, Xianghua Faculty of Information Engineering and Automation Kunming University of Science and Technology Kunming650500 China Computer Technology Application Key Laboratory of Yunnan Province Kunming650500 China
Intrusion detection based on machine learning plays an important role in the security protection of the network environment. In order to improve the accuracy of network intrusion detection, intrusion detection algorit... 详细信息
来源: 评论
Mathematical Modelling of ANP for Trust Based IoT Device Categorization in Secured Smart Logistics
收藏 引用
Journal of Network and systems Management 2025年 第3期33卷 1-35页
作者: Abbas, Arbab Waseem Marwat, Safdar Nawaz Khan Al-Fuqaha, Ala Brahim, Ghassen Ben Ahmed, Salman Khan, Waseem Ullah Institute of Computer Sciences and Information Technology Faculty of Management and Computer Sciences The University of Agriculture Peshawar Pakistan Department of Computer Systems Engineering University of Engineering and Technology Peshawar Pakistan College of Science and Engineering Hamad Bin Khalifa University Doha Qatar College of Computer Engineering and Science Prince Mohammad Bin Fahd University Al-Khobar Kingdom of Saudi Arabia
In today’s era of massive information exchange, trust plays a significant role in the Internet of Things (IoT) security and privacy. Trust specifies the confidence of one point or network entity on another in a netwo...
来源: 评论
Prepartition: Load Balancing Approach for Virtual Machine Reservations in a Cloud Data Center
收藏 引用
Journal of computer Science & technology 2023年 第4期38卷 773-792页
作者: 田文洪 徐敏贤 周光耀 吴逵 须成忠 Rajkumar Buyya School of Information and Software Engineering University of Electronic Science and Technology of China Chengdu 610054China Yangtze Delta Region Institute(Huzhou) University of Electronic Science and Technology of ChinaHuzhou 313001China Institute of Advanced Computing and Digital Engineering Shenzhen Institute of Advanced TechnologyChinese Academy of SciencesShenzhen 518055China Department of Computer Science University of VictoriaVictoriaBCV8W 3P6Canada State Key Laboratory of Internet of Things for Smart City University of MacaoMacao 999078China School of Computing and Information Systems University of MelbourneMelbourne 3010Australia
Load balancing is vital for the efficient and long-term operation of cloud data *** virtualization,post(reactive)migration of virtual machines(VMs)after allocation is the traditional way for load balancing and consoli... 详细信息
来源: 评论
A Novel Krill Herd Based Random Forest Algorithm for Monitoring Patient Health
收藏 引用
computers, Materials & Continua 2023年 第5期75卷 4553-4571页
作者: Md.Moddassir Alam Md Mottahir Alam Muhammad Moinuddin Mohammad Tauheed Ahmad Jabir Hakami Anis Ahmad Chaudhary Asif Irshad Khan Tauheed Khan Mohd Department of Health Information Management and Technology University of Hafr Al-BatinSaudi Arabia Department of Electrical and Computer Engineering Faculty of EngineeringKing AbdulazizJeddah21589Saudi Arabia Center of Excellence in Intelligent Engineering Systems King Abdul Aziz UniversityJeddahSaudi Arabia College of Medicine King Khalid UniversityAbhaSaudi Arabia Department of Physics College of ScienceJazan UniversityP.O.Box.114Jazan45142Saudi Arabia Department of Biology College of ScienceImam Mohammad Ibn Saud Islamic University(IMSIU)Riyadh11623Saudi Arabia Computer Science Department Faculty of Computing and Information TechnologyKing Abdulaziz UniversityJeddah21589Saudi Arabia Department of Math and Computer Science Augustana CollegeIL61201United States
Artificial Intelligence(AI)is finding increasing application in healthcare *** learning systems are utilized for monitoring patient health through the use of IoT sensor,which keep track of the physiological state by w... 详细信息
来源: 评论
Desertification Detection in Makkah Region based on Aerial Images Classification
收藏 引用
computer systems Science & engineering 2022年 第2期40卷 607-618页
作者: Yahia Said Mohammad Barr Taoufik Saidani Mohamed Atri Electrical Engineering Department College of EngineeringNorthern Border UniversityArarSaudi Arabia Laboratory of Electronics and Microelectronics(LR99ES30) Faculty of Sciences of MonastirUniversity of MonastirTunisia Department of Computer Sciences Faculty of Computing&Information TechnologyNorthern Border UniversityRafhaSaudi Arabia College of Computer Sciences King Khalid UniversityAbhaSaudi Arabia
Desertification has become a global threat and caused a crisis,especially in Middle Eastern countries,such as Saudi *** is one of the most important cities in Saudi Arabia that needs to be protected from *** vegetatio... 详细信息
来源: 评论
Unveiling the Landscape of Machine Learning and Deep Learning Methodologies in Network Security: A Comprehensive Literature Review  2
Unveiling the Landscape of Machine Learning and Deep Learnin...
收藏 引用
2nd International Conference on Cyber Resilience, ICCR 2024
作者: Saeed, Nouf Majid Sultan Eid Ibrahim, Amer Ali, Liaqat Al-Dmour, Nidal A. Mohammed, Abdul Salam Ghazal, Taher M. American University In The Emirates Dubai United Arab Emirates College Of Engineering And Technology University Of Science And Technology Of Fujairah Fujairah United Arab Emirates College Of Engineering Mutah University Department Of Computer Engineering Jordan Skyline University College University City Sharjah Shariah United Arab Emirates Khalifa University Centre For Cyber Physical Systems Computer Science Department United Arab Emirates Center For Cyber Security Faculty Of Information Science And Technology Selangor Bangi43600 Malaysia
The dynamic nature of cyber threats offers a continual problem in the field of cybersecurity in the context of the expanding internet environment. This study provides an in-depth assessment of the literature on machin... 详细信息
来源: 评论
WSports-50: An Image Dataset for Women’s Sport Action Classification  4th
WSports-50: An Image Dataset for Women’s Sport Action Class...
收藏 引用
4th International Conference on Frontiers in Computing and systems, COMSYS 2023
作者: Ray, Palash Bera, Asish Krejcar, Ondrej Bhattacharjee, Debotosh Nasipuri, Mita Department of Computer Science and Engineering Haldia Institute of Technology West Bengal Haldia India Department of Computer Science and Information Systems BITS Pilani Rajasthan Pilani India Center for Basic and Applied Science Faculty of Informatics and Management University of Hradec Kralove Rokitanskeho 62 Hradec Kralove500 03 Czech Republic Department of Computer Science and Engineering Jadavpur University West Bengal Kolkata India
Sport action recognition is an interesting area in computer vision. Categorization of sport actions, representing difficult and complex body postures, is regarded as a fine-grained visual classification problem. The C... 详细信息
来源: 评论